jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

If candies have a cost X cents less per dozen, it would have cost 3 cents less for x+3 candies then if they had cost x cents more per dozen. What is x?
Compare the approaches of Chandragupta and Asoka to ruling the Maurya empire?
As a _____, Allison buy jeans; and as a _____, Allison make T-shirts. So, she plays both roles. producer, consumer entrepreneur, producer consumer, producer
On a certain map 1.25 inches represents 20 miles. Long wood and mill town are 5 inches apart on the map. What is the actual distance between longwood and Millto
I will give BRAINLIEST to whoever is correct.
All atoms of an element always have the same number of Neutrons Electrons Electrons Protons
what is the result of converting 2.3 miles into yards
Please answer me this equation
what two new fields of biology use DNA technologies?
The preamble to the constitution does NOT specify providing for a. Economic equality b. Common defense c. Domestic tranquility d. Justice